Knowledge Check: CompTIA A+ Core 2 (220-1102) Post-Assessment Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

It is important to keep good backups of your important data, and one way to do this is by turning on System Restore. Sometimes, data that is backed up can become lost or corrupted, and there are Windows tools available to help recover this data. What alternative would you suggest to recover lost or corrupted data (Select all that apply)? a. A Third-party file recovery software b. Create a system image. c. Build a System Partition. d. A SATA-to-USB converter kit

a. A Third-party file recovery software d. A SATA-to-USB converter kit

You sign into your personal computer and notice that the system is unusually slow when you try to open files or access websites. You open the network traffic monitoring and confirm that the CPU resources are being strained. Can you explain what is happening with the computer? a. A denial-of-service (DoS) attack has been launched on the computer. b. A boot sector virus has infected the computer. c. A CryptoLocker Trojan program was embedded in an email. d. A zero-day attack has affected the software.

a. A denial-of-service (DoS) attack has been launched on the computer.

Aiden is working at a satellite office for his company. He is asked to go offsite to deal with a Windows 10 computer that is not working properly. Aiden is unfamiliar with Windows 10, so he has difficulty finding the solution to the problem. He finds himself becoming frustrated and angry at the computer. What should Aiden do to help the situation? (Select all that apply.) a. Call his supervisor and ask for help. b. Continue to work on the problem. c. Walk away from the problem and come back later d. Tell the user that he can't fix the computer and escalate the problem.

a. Call his supervisor and ask for help. c. Walk away from the problem and come back later d. Tell the user that he can't fix the computer and escalate the problem.

You want all sales team members to have read and write access to the 'Sales' folder which is located on the company's file server. All other users on the network must be restricted from viewing or modifying the files in the 'Sales' folder. What should you do to configure this scenario? a. Configure both NTFS and share permissions on the sales folder. b. Configure FAT32 permissions on the sales folder. c. Configure share permissions on the sales folder. d. Configure NTFS permissions on the sales folder

a. Configure both NTFS and share permissions on the sales folder.

You are the IT support technician for a small organization. Your manager is asking what precautions you can put in place to protect the company's network-attached PCs from attacks over the Internet, as well as attacks over the local network. Which of the following will be included in your recommendation? a. Configure the Windows Defender Firewall to disallow uninvited communication. b. Install and configure a Domain Controller with Active Directory. c. Create a folder share on a server and move all user data to the shared folder. d. Enable BIOS/UEFI passwords on all PCs.

a. Configure the Windows Defender Firewall to disallow uninvited communication

You are at school and realize you left your power cord at home. You want the battery to last as long as possible. What would you modify to save battery power? a. Create a Power Plan to enable Battery Saver while in use and Sleep Mode when idle. b. Set a sleep timer that will place the laptop in hibernation when the battery reaches 10%. c. Access the Settings App to enable the Backup Battery Power Pack. d. Borrow a power cord from the library.

a. Create a Power Plan to enable Battery Saver while in use and Sleep Mode when idle.

Nia and her teammates in an insurance company's IT department are planning the rollout of a new business application. As they review the knowledge base for this application, they read about several instances of scope creep, days of downtime, and other unintended results of the change. They also read about what other organizations eventually did to overcome some of these problems. If you were in Nia's shoes, how would you present the possibility of such problems within the flow of change management? a. Develop a risk analysis and rate the reported problems by risk level for the insurance company. b. Submit a request for comments from all technical users. c. Send the knowledge base articles to all technical users to notify them of potential risks. d. Explain that all examples were related to different types of organizations and should not affect the insurance company.

a. Develop a risk analysis and rate the reported problems by risk level for the insurance company.

Shawn's supervisor has tasked him with determining how the company can increase the security of its Wi-Fi technology. Shawn plans to present several options to his supervisor and ask them to check his work. Which of the following is not a strong security method? a. Disabling SSID b. WPS encryption c. RADIUS software d. MAC filtering

a. Disabling SSID

The users in your accounting department are often away from their workstations to check inventory in the warehouse. During these times, the accounting application installed on their workstations must remain open. How can you configure the user's workstations to prevent unauthorized employees from viewing information on the monitors while allowing the accounting application to remain open? a. Enable the screensaver and require a password to unlock the workstation. b. Require each user to change their password every 30 days. c. Require all users to turn off their monitors when they leave their work area. d. Configure password expiration on each workstation.

a. Enable the screensaver and require a password to unlock the workstation.

A mobile device has stopped receiving automatic OS updates that until recently were pushed to the device. What is the most likely reason for this issue? a. End-of-life limitation b. Cloud storage failure c. Product release information d. Single sign-on

a. End-of-life limitation

Hideya and her cohort are collaborating on a big project for a college-level computer science course. The project will require them to share lots of files and sometimes applications. Once completed, they each will print their portion of the thesis to the classroom printer. Chandra, one of Hideya's cohorts, suggests they build a client/server network, but Hideya disagrees. Why do you think Hideya disagrees with building a client/server network? a. Hideya prefers a peer-to-peer network that will allow for file and resource collaboration while allowing each cohort member to maintain control of their device. b. Hideya prefers an Azure AD network, which will facilitate each user's bring your own device (BYOD) experience. c. Hideya thinks it's easier to just send the files needed by email. d. Hideya wants to suggest a virtual private network in order to achieve minimum security levels.

a. Hideya prefers a peer-to-peer network that will allow for file and resource collaboration while allowing each cohort member to maintain control of their device.

Dawn is having trouble accessing files on a storage device from her Windows computer. A little research reveals that this storage device was originally formatted using the Apple File System (APFS). What does Dawn need to do to access these files? a. Install a third-party driver for the APFS. b. Reformat the storage device using the FAT32 and exFAT file systems. c. Encrypt the storage device with the FileVault. d. Install a Remote Disc to enable access to the storage device.

a. Install a third-party driver for the APFS.

An IT technician is troubleshooting a Mac that is exhibiting crashed apps and the OS restarting automatically during kernel panics. Which of the following steps can be taken to troubleshoot the kernel panic? a. Launch the macOS Recovery to reinstall macOS from a Time Machine backup. b. Use the Finder utility to search for corruption nodes in the boot process. c. Use the Disk Utility to alter the boot mode. d. Use Command + R to run a diagnostic test

a. Launch the macOS Recovery to reinstall macOS from a Time Machine backup.

What component or feature would be used to change battery pack options on a laptop? a. Power Options b. Privacy c. Devices d. Accounts

a. Power Options

What actions would you take to preform Disk Management? a. Prepare a drive for use, Shrink an existing partition, or Mount a drive. b. Partition a Logical drive, Troubleshoot problems with the hard drive, Copy the hard drive. c. Create an Active Directory network, Use Windows dynamic disks, Repairs corrupted drives. d. Create a Simple volume, Create a new partition, Enables the Windows Recovery Environment.

a. Prepare a drive for use, Shrink an existing partition, or Mount a drive.

Regardless of the operating system installed on a computer, they will all perform four main functions. Which of the following main functions do all operating systems perform? a. Provide a user interface, manage files, manage hardware, and manage applications. b. Provide user support, manage servers, manage software, and manage remote connections. c. Provide a user interface, manage error/bugs, manage drivers, and manage clock speeds. d. Provide power management, manage files, manage hardware, and manage port connections.

a. Provide a user interface, manage files, manage hardware, and manage applications.

A company wants to implement a single server computer to speed up Internet access and protect the private network from attack over the Internet. Which type of server will best meet these requirements? a. Proxy server b. File server c. Domain controller d. Mail server

a. Proxy server

Penelope is examining a computer that was brought into her computer repair business. She has found that the system has a failed hard drive. Penelope has decided to reimage the computer from a saved system image. What actions would you take to perform the reimage? a. Reboot in Windows RE, then select System Image Recovery from the Advanced options screen b. Recover the image from the current OS software version and repair the registry. c. Use the Last Known Good Configuration to roll the system back to the previous Windows update. d. Reboot the computer and follow the prompts in the Startup Settings Screen.

a. Reboot in Windows RE, then select System Image Recovery from the Advanced options screen

You have been dispatched to deal with an escalated trouble ticket in which the user is receiving an error message stating Windows detected a hard drive problem reading from sector 153. The previous technician backed up the user's data and started troubleshooting but was unable to duplicate the error. Which of the following steps should you take next to help determine the cause of the error message? a. Run chkdsk on each HDD installed on the system. b. Execute taskkill on all storage service processes. c. Revert the system to a previous restore point using System Restore. d. Edit the registry using regedit to remove error messages.

a. Run chkdsk on each HDD installed on the system.

Which of the following will increase the level of security for personal and confidential information on a mobile device if the device is lost or stolen? (Select TWO.) a. Screen lock b. Remote wipe c. OS update/patch management d. Remote backup application e. Anti-malware/antivirus

a. Screen lock b. Remote wipe

A mobile device user recently installed several free apps and now is receiving strange text messages or phone calls. In addition, the user is also experiencing a weak signal as well as dropped phone calls even when none of the free apps are running. Which of the following is the most likely cause for the issues with phone calls and messages? a. The device is infected with malware. b. The cellular service is throttling the signal. c. The free apps need to be updated. d. The anti-malware app on the device is misbehaving.

a. The device is infected with malware.

Whitney has just been hired as an IT Helpdesk Technician. Her supervisor reviews the standard operating procedures and stresses the importance of collecting and inputting detailed information in the OPAS ticketing system. Such details could include a description of the problem(s), the ticket's category, and the severity of the problem or situation, etc. Can you explain why the supervisor stressed that Whitney should collect detailed information? a. The information is useful as a resource if similar problems recur. b. The information helps various IT personnel solve the problem, including the initial technician, IT Management, and if escalated, the additional techs involved. c. The information helps the IT department adjust the IT staff's computer settings. d. The IT Department keeps track of who may be breaking devices. e. This information helps the IT department to know who needs to sign the acceptable use policy.

a. The information is useful as a resource if similar problems recur. b. The information helps various IT personnel solve the problem, including the initial technician, IT Management, and if escalated, the additional techs involved.

You have received a phone call from a user who is experiencing very sluggish performance on a Windows 11 computer. During the phone call, you determine an application is hung and the keyboard is not responding to keypress events. The user confirms the mouse is functioning and the computer is recognizing mouse clicks. How will you instruct the user to open Task Manager to terminate the hung application? a. The user will need to use the mouse to right-click the Taskbar and then left-click the Task Manager entry on the context menu. b. The user will need to press the Win+X keys and type taskmgr.exe in the search box. c. The user will need to press the Ctrl+Alt+Delete keys and then use the mouse to left-click the Task Manager entry on the security screen. d. The user should press the Ctrl+Shift+Esc keys, and the Task Manager will be displayed.

a. The user will need to use the mouse to right-click the Taskbar and then left-click the Task Manager entry on the context menu.

Apple reserves the right to void the warranty or refuse to provide support. a. True b. False

a. True

Ubuntu Desktop can only be installed as a guest OS in a Virtual Machine if the host OS is 64 bit? a. True b. False

a. True

What would result if a Standard User attempted to install software that might change the Windows registry? a. UAC would be promoted to continue installation. b. The user would be prompted to contact Windows Support. c. The installation would be allowed. d. A system backup would be required.

a. UAC would be promoted to continue installation.

You received an alert from your email service stating that several of your usernames and passwords had been intercepted. You report this to the IT department and they tell you that this is a result of a Man-in-the-Middle Attack. The IT department resolved this issue. How would the IT department prevent further attacks? a. Use digital certificates to identify online services before transmitting sensitive information. b. Disconnect the computer from the network. c. Apply software security patches from the vendor. d. Keep backups of data file versions.

a. Use digital certificates to identify online services before transmitting sensitive information.

Melvin is working on a customer's Mac computer that is displaying errors from system files. What actions would you take to repair a hard drive? a. Use the First Aid feature to scan the hard drive for system errors b. Remove login items to speed up the boot process. c. Install macOS and app updates to remove system errors. d. Delete corrupted files, then empty the trash.

a. Use the First Aid feature to scan the hard drive for system errors

A technician has been dispatched to resolve an issue with a Windows 10 computer experiencing application crashes. What choice would you have made first if you were the technician? a. Verify critical user data has been backed up. b. Uninstall software the user no longer needs. c. Disable unwanted scheduled tasks. d. Disable unused services

a. Verify critical user data has been backed up.

While using the shell prompt on an Ubuntu Desktop with Linux volume, you want to move from the current directory to the directory where Ubuntu is installed. Which of the following will perform this action? a. cd / b. cd root / c. cd %systemdrive% d. cd systemroot

a. cd /

What is the value of the variable scriptcount when execution ends in the following sample script? scriptcount = 10 While scriptcount < 10 scriptcount = scriptcount - 1 Loop a. 9 b. 10 c. Endless loop d. 1

b. 10

When installing Ubuntu, what can be installed to add virtual memory and improve performance? a. A Terminal b. A Swap Partition c. A Boot Loader d. A Virtual Machine

b. A Swap Partition

How is user account authentication typically achieved when a computer is joined to a Windows domain? a. Local Group Policy performs authentication. b. Active Directory Domain Services is responsible for account authentication. c. Authentication must happen at the local computer. d. Authentication is achieved by brute force.

b. Active Directory Domain Services is responsible for account authentication.

Brad is trying to determine whether the video doorbell he would like to purchase is an IoT device. What will the video doorbell require for it to be considered an IoT device? (Select all that apply.) a. Controller hub b. App to control the device c. Z-Wave configuration d. IP address on the network e. Digital assistant

b. App to control the device d. IP address on the network

Brandon has just installed the Windows 10 OS and wants to verify that all drivers are installed properly. Which of the following is the best control Panel applet to verify that all drivers are installed? a. System applet b. Device Manager c. Event Viewer d. Settings

b. Device Manager

If a laptop's OEM recovery partition becomes corrupt, what can be done to restore it back to factory defaults? (Select all that apply.) a. Do a clean installation of Windows. b. Download recovery media from the manufacturer's website. c. Do an in-place upgrade. d. Use the Windows recovery drive on a flash drive you created

b. Download recovery media from the manufacturer's website. d. Use the Windows recovery drive on a flash drive you created

Your manager is asking for precautions to be taken to prevent company data leaks if the organization's Windows 11 computers with locally stored data should be lost or stolen. Which of the following methods can be used to meet this requirement? (Select TWO.) a. Configure authenticator apps on the systems b. Encrypt the HDDs with BitLocker. c. Require that local user accounts have strong passwords. d. Encrypt the data with BitLocker To Go. e. Configure a drive lock password on the systems.

b. Encrypt the HDDs with BitLocker. e. Configure a drive lock password on the systems.

You currently save all of your painting files to the C:\Pictures\NewPortraits folder, but you now want the default location for these types of files to be C:\Pictures. How would you alter the command prompt to change the default location? a. Enter C:\Pictures> cd.. NewPortraits b. Enter C:\Pictures\NewPortraits> cd.. c. Save to the NewPortraits folder first, then cut and paste to the Pictures folder. d. Enter C:\Pictures> cd..

b. Enter C:\Pictures\NewPortraits> cd..

macOS screen sharing is as secure as other types of remote access software. a. True b. False

b. False

What is the function of firmware as it relates to a computer's hardware? a. Firmware enables compatibility and interfaces with device drivers. b. Firmware controls the motherboard and interfaces with the OS. c. Firmware controls the UEFI/BIOS and interfaces with the motherboard. d. Firmware controls disk management and interfaces with the virtual computer.

b. Firmware controls the motherboard and interfaces with the OS.

Which of the following security methods is most likely to have the greatest negative impact on device performance by consuming processing resources? a. Locator applications b. Full device encryption c. Fingerprint lock d. Remote backup applications

b. Full device encryption

Your customer is using the Windows Settings app in Windows 11 to set up a new Bluetooth mouse on their laptop. What part of the OS is responsible for relating to hardware using device drivers? a. System Processes b. Kernel c. Mouse d. Bluetooth & Devices Setting applet

b. Kernel

Immanuel's desktop computer has been overheating for the past week. Sometimes he feels excessive heat coming from the computer case. What would you suggest he do to protect his computer when there is excessive heat? a. Reinstall the fan drivers. b. Power down the system and repair the issue. c. Perform a Backup and Restore. d. Edit Power Options and set the computer to Battery Saver mode.

b. Power down the system and repair the issue.

What information is included in a data retention policy for regulated data? a. All users who access the data must sign a Chain of Custody document. b. The number of years data must be retained. c. The nature of data encryption. d. The requirement for data to be backed up locally.

b. The number of years data must be retained.

You are troubleshooting a Mac computer with an app that has stopped responding to mouse or keyboard actions. How can you stop the application when it is nonresponsive? a. Use the Command + spacebar keystroke. b. Use the Command + Option + Esc keystroke. c. Use the Command + X keystroke. d. Use the Shift + Command + 5 keystroke

b. Use the Command + Option + Esc keystroke.

Which statement is true about copying a Windows installation from one computer to another? a. You cannot copy a Windows installation onto a compatible computer unless you uninstall and reinstall Windows on both computers. b. You cannot copy a Windows installation from one computer to another. c. You can copy a Windows installation to another computer if you first move the hardware abstraction layer (HAL). d. You can copy a Windows installation from one computer to another, but only if the computers have identical hardware

b. You cannot copy a Windows installation from one computer to another.

Which of the following describe the macOS's Mission Control? a. A place to locate files and folders b. A place to repair file system errors and hard drive corruption c. A place to view all open windows and desktops with the option to switch between them d. A place to access options to put the computer to sleep, log out, restart, or shut down the system

c. A place to view all open windows and desktops with the option to switch between them

Your company is starting a new security initiative with a focus on layered protection. How would you demonstrate layered protection on the company devices? a. By changing the default user account password. b. Creating passwords in a foreign language to avoid being hacked. c. By requiring a power-on password. d. Change the account security measure to Facial Recognition.

c. By requiring a power-on password.

Andrew is troubleshooting a remote computer by attempting to ping to a host. The ping is successful when he uses its IP address, but the ping is unsuccessful when he uses its domain name. What is the problem with the remote computer? a. The NIC card's BIOS needs to be enabled. b. The APIPA needs to be assigned on the computer. c. DNS is down. d. The default gateway router is malfunctioning.

c. DNS is down.

Chad, an IT support technician, is configuring three 802.11g wireless access points (WAPs) in a customer's building. The WAPs will be in close proximity to each other with some overlap of wireless signals to ensure reliable wireless coverage. What channel configuration should the technician assign to the WAPs? a. Each WAP is assigned any unused channel. b. Each WAP is assigned the same channel for redundancy. c. Each WAP is assigned a different nonoverlapping channel. d. Each WAP is assigned a different even-numbered channel.

c. Each WAP is assigned a different nonoverlapping channel.

Elijah works in a bank's IT department. They are planning to upgrade an essential business application that is used by employees and customers. Predict what would happen if bugs were encountered and the system was down for more than 48 hours. a. Employees would rely on the IT department working tirelessly to resolve the issue within 48 hours, as promised. Customers would not be less affected. b. Employees would take time off until the issue is resolved. Customers would be less affected. c. Employees would lose focus and productivity would be reduced. Customers would not have access to the application. d. Employees would enable workarounds and maintain productivity. Customers would have negative financial effects.

c. Employees would lose focus and productivity would be reduced. Customers would not have access to the application.

You are configuring a user account on a Windows 11 computer that visiting vendors and sales professionals will use in the company's reception area. The user account needs to be the most restrictive type of account. Which of the following types of user accounts would meet this requirement? a. Administrator account b. Power Users group c. Guest account d. Standard User account

c. Guest account

Chuy, a software developer wants to run regular tests of his newest application on Windows 11, Windows 10, Windows 8.x, and Ubuntu Linux. Currently, Chuy is installing the application on various users' computers scattered throughout the building. Which of the following would be the best method to allow Chuy to easily test their application on multiple operating systems with the least amount of effort? a. Install a Type 1 hypervisor on his desktop and install each OS in its own VM. b. Create a full system image of each OS, save them to the server, and reimage the computer as needed. c. Install a Type 2 hypervisor on his desktop and then install each OS in a separate VM. d. Backup the desktop computer, reformat the HDD, and install each OS for a multi-boot system.

c. Install a Type 2 hypervisor on his desktop and then install each OS in a separate VM.

Ray worked all morning trying to fix Lisa's broken computer. Ray discovered a problem with the RAM and replaced a bad module. He put the computer back together and tested the new RAM. He rebooted the computer into UEFI and all the modules were read properly. Ray documented the problem and the solution in his tracking software and now is ready to head back to his work area. Who decides whether the issue is resolved? a. Ray b. Ray's supervisor c. Lisa d. Lisa's supervisor

c. Lisa

The corporate office has mandated that all organization's computers must enable two-factor authentication by the end of the year. The company maintains a collection of Windows 10 and Windows 11 devices. Some of the devices already contain the TPM chip necessary for authentication, but others do not. One department head suggested replacing all of the old devices with newer models that contain the TPM chip, but this could be very costly. What other way would you plan to enable two-factor authentication in all devices? a. Modify the network settings to hard wire the startup key via wireless connection. b. Discontinue use of devices without the TPM chip and have users share the newer devices. c. Purchase a USB flash drive for each of the older devices and load the startup key that is found on a TPM chip. d. Buy and install a TPM chip adapter for all older devices.

c. Purchase a USB flash drive for each of the older devices and load the startup key that is found on a TPM chip.

Luis checked his setup BIOS and saw that the hard drive was connected. Luis has decided to boot to the Windows RE Command Prompt. How would you solve this issue? a. Perform a System Retore using command "bcdedit /enum". b. Repair the operating system using command "bootrec /rebuildBCD". c. Repair the master boot record using command "bootrec /fixmbr". d. Boot the computer in Safe Mode, then repair hard drive using command "bootrec /fixboot

c. Repair the master boot record using command "bootrec /fixmbr".

Tara brings her laptop to your business for repair. She tells you that she is getting an error message, stating "Your computer is low on memory" on her Windows computer. How would you determine the source of the low memory warning (Select TWO)? a. Uninstall the last application that was added to the system. b. Open Task Manager and check the Processes tab for memory-hungry apps. c. Run the msinfo32.exe utility to determine the amount of physical memory installed. d. Interview Tara about her recent activity on the computer and new application installs. e. Download and install updated graphics drivers.

c. Run the msinfo32.exe utility to determine the amount of physical memory installed. e. Download and install updated graphics drivers.

A Windows 10 computer is experiencing a problem when launching an application and displays a message indicating a dependent background service is not running. The technician assigned to the trouble ticket has determined that the dependent service needs to start automatically when Windows is started. Which of the following tools will allow the technician to configure the dependent service to start automatically? a. Task Scheduler b. Task Manager c. Services Console d. System Configuration

c. Services Console

A Mac user is trying to locate a file by name. Which macOS utility can be used to find the file? a. Mission Control b. Terminal c. Spotlight d. iCloud Drive

c. Spotlight

Marta lost her iOS device two months ago, but now that she has found it realizes that she forgot her password. She has performed nine failed passcode attempts and she has been warned that the device is set to erase all data after ten failed passcode attempts. She is considering using Recovery Mode to access her device. What other way would you choose to access the device? a. Perform a remote wipe. b. Change the Face ID and Passcode settings to allow for more login attempts. c. Sync to the backup to access the phone. d. Use an alternate login method, like fingerprint or facial recognition.

c. Sync to the backup to access the phone.

Kimberly works as an IT support technician in a large corporation. Her department's next project is to upgrade the OS on all devices from Windows 10 to 11. There are more than 250 devices that will need to be prepared and updated. Choose the best statements that apply to an effective deployment strategy. a. The Windows Autopilot method is the best strategy because it runs the upgrade automatically when users log in, then manually upgrade devices that aren't assigned to users. b. The In-place upgrade method is the best strategy because all they would have to do is push the Microsoft Deployment Toolkit (MDT) to all network devices. c. The best strategy is to develop and deploy a standard image with Windows 11 OS to ensure a clean installation. d. The best strategy is to replace an old Windows 10 devices with new Windows 11 ones to eliminate the possibility of system errors.

c. The best strategy is to develop and deploy a standard image with Windows 11 OS to ensure a clean installation.

A mobile device user is experiencing faster than normal battery drain after connecting to a public Wi-Fi hotspot a few days ago. Which of the following could be a reason for the fast battery drain? a. The user has exceeded the limit on their data plan. b. The mobile device's Wi-Fi antenna is not functioning. c. The mobile device is infected with malware. d. The mobile device is connecting to multiple Bluetooth devices.

c. The mobile device is infected with malware.

A technician is following instructions to resolve an issue on a workstation where the Windows system files are suspected to be corrupted. How would you demonstrate the use of an elevated command prompt to verify file corruption? a. Type cmd in the search box and press Enter. b. Open System Configuration and click Command Prompt. c. Type sfc /scannow in the search box, then right-click Command Prompt. d. Right-click the desktop and click Command Prompt (Admin).

c. Type sfc /scannow in the search box, then right-click Command Prompt.

You are troubleshooting a mobile device that restarts for no reason. The user reports that the phone restarts randomly whether in use or idle. Which of the following steps should you take first? a. Close any unused apps. b. Reset the device to factory defaults. c. Uninstall suspected apps and update the OS. d. Perform a PRL update.

c. Uninstall suspected apps and update the OS.

You want to make some application changes on your computer. You want to be able to restore your system back to the current settings if you encounter any issues. What actions can you take to save your system settings? (Select all that apply.) a. Save Settings in the Devices applet. b. Backup your Windows account information. c. Use System Protection to create a restore point. d. Run the rstrui.exe utility.

c. Use System Protection to create a restore point. d. Run the rstrui.exe utility.

The computer of a former employee has been brought to the IT Department. The former employee's manager has asked that you remove all of the data. Which of the following is the best way to properly dispose of the stored data? a. Use a degausser to erase the data on a magnetic hard drive. b. Use a drive shredder to pulverize small storage devices. c. Use a secure third-party data-destruction vendor. d. Overwrite data on the drive.

c. Use a secure third-party data-destruction vendor.

Karen is comparing diverse types of IoT devices, including the wireless network protocol she uses. She is interested in wireless technology that uses the 2.4 GHz band with a range of approximately 20 m. What technology will Karen decide to use? a. Bluetooth b. Z-Wave c. Zigbee d. NFC

c. Zigbee

Which command would you use to configure system policy for password length, characters, complexity, and expiration? a. net user Administrator <password> b. gpupdate /force. c. gpedit.msc. d. gpresult /scope user /user password

c. gpedit.msc.

What protocol or feature uses incoming TCP port 5900 for communication? a. Telnet protocol b. Windows Remote Desktop Protocol c. macOS Screen Sharing d. SSH protocol

c. macOS Screen Sharing

Which of the following Linux terminal commands will direct you to comprehensive information about the shutdown command? a. shutdown help b. sudo shutdown c. man shutdown d. shutdown /?

c. man shutdown

A Windows user cannot remember how to structure the shutdown command to perform a reboot instead of a shutdown. Which of the following will assist the user? (Select all that apply.) a. help reboot b. help shutdown c. shutdown help d. shutdown /? e. reboot /? f. shutdown /h

c. shutdown help d. shutdown /?

A computer science teacher notices that Windows gets bogged down right after a student from 3rd period signs into Workstation 15. How would you explain the issue? a. An issue with the Master Boot Record b. An issue with the student pressing multiple function buttons during the boot process c. An issue with the Boot Configuration Data d. An issue with the student's user profile

d. An issue with the student's user profile

Your company is asking the IT department to take steps to review the current disaster plan in an effort to prevent any disruptions in business or possible data losses. The company currently maintains its sensitive data on a local file server. This data is also backed up at an off-site location. What other way would you choose to prepare for disaster recovery? a. Maintain three copies of our own backup files in each of our three locations. b. Back up data to the public cloud. c. Require employees to take their devices home and use no backup. d. Back up data to the cloud and maintain data on a local file server.

d. Back up data to the cloud and maintain data on a local file server.

Mary is trying to access the Advanced Boot Options menu in Windows 10. She called the help desk and was told that she needs to press F8 while the computer is booting. Unfortunately, Mary has been trying this for several boots, and it is not working to access Advanced Boot Options. Why doesn't pressing F8 work? a. Mary is not pressing the F8 key at the right time during the boot process. b. The F8 key is not working properly and she should replace her keyboard. c. F8 does not launch the Advanced Boot Options menu; instead, she should press F5. d. By default, the F8 key is disabled in Windows 10 and must be manually enabled via the Command Prompt.

d. By default, the F8 key is disabled in Windows 10 and must be manually enabled via the Command Prompt.

Which of the following steps will minimize attacks on the default, built-in user accounts created during a Windows setup? a. Change the default user account group membership. b. Change the default user account password. c. Disable the Guest group. d. Change the default user names for the Administrator and Guest accounts.

d. Change the default user names for the Administrator and Guest accounts.

Lance has a computer that currently uses Windows 10 and wants to install the latest version of Windows 11 on the computer. He wants to keep the Windows 10 OS available for testing applications he is developing for both operating systems. Which type of installation would you recommend Lance perform? a. In-place upgrade b. Custom installation c. Virtual installation d. Dual-boot installation

d. Dual-boot installation

FTP services were recently added to a client's SOHO network to enable the marketing team to copy large files to a storage server. Since the change, the wired and wireless network users are complaining that the training videos they are required to watch are choppy and constantly buffering. The video streaming server and storage server are both hosted on the local network. Which of the following is the best solution to increase the performance of the video streaming service while maintaining the ability to transfer large files to the storage server? a. Enable NAT b. Enable QoS c. Enable MAC filtering d. Enable UPnP

d. Enable QoS

Amari is new to being an IT technician and wants to research the error message he is encountering while working on a ticket. Where can Amari find information to help him solve the issue? a. Network topology diagrams b. Microsoft Sam c. Asset management d. Knowledge base

d. Knowledge base

While watching a live stream on his computer using Microsoft Edge, Aiden is receiving random ads for Doritos. How can Aiden stop these random ads from interrupting his web browsing? a. Spyware removal tool b. Antivirus software c. Windows Security settings app d. Pop-up blocker

d. Pop-up blocker

Jeanine turned on her computer, and a black screen appeared with a strange error message. She calls you hoping you could offer a suggestion. How would you generate a plan to resolve this issue? a. Perform a hard boot, then reinstall the UEFI/BIOS. b. Reimage the computer. c. Boot the computer in Safe Mode, then run a PC Health Check. d. Research the error message and proven solutions from trusted websites

d. Research the error message and proven solutions from trusted websites

Meriwether just learned that Microsoft offered a free upgrade to Windows 10 from Windows 8.1. Her desktop computer is currently running Windows 8.1, and she wants to first upgrade to Windows 10, then upgrade to Windows 11. What data should Meriwether use to determine if her device qualifies for Windows 11? a. Static IP addressing functionality is required b. A DVD-drive is required for the installation disc c. Run the diskpart command d. Run the PC Health Check

d. Run the PC Health Check

Semaj's computer was displaying slowness and freezing. He defragmented his system in the hopes that this would correct the issue, but system performance is still an issue. What approach would you use to address the systems issues? a. Run msinfo32.exe utility to view corrupted system resources. b. Run the msconfig.exe utility to deselect startup services that are overloading the system. c. Run the services.msc command to re-configure Windows services. d. Run the chkdsk command to fix any file system errors.

d. Run the chkdsk command to fix any file system errors.

A user calls the service desk and requests to be upgraded from Windows 8 to Windows 10. Before installing, the technician would like to make sure the user's requirements were met. Which component would not meet the requirement for installing the updated version of Windows? a. RAM: 4 GB b. UEFI firmware with secure boot & a 2.0 TPM chip c. Processor (CPU): 1 GHz or faster d. Storage: 32GB

d. Storage: 32GB

A technician is attempting to initiate a Windows Remote Desktop Connection to repair a remote system. When the technician tries to access the Remote Desktop utility on the local computer, the graphical user interface consistently freezes. Which of the following will allow the technician to access the Remote Desktop utility using only the command line? a. msinfo32.exe b. msconfig.exe c. taskmgr.exe d. services.msc e. mstsc.exe

e. mstsc.exe

What Apple file type is similar to a setup.exe file used in Windows? a. ISO b. DMG c. PKG d. APP

c. PKG

Which of the following Linux commands can be used to enable a network adapter and assign a static IP address to that adapter? a. inconfig b. iwconfig c. ifconfig d. ipconfig

c. ifconfig

A technician is troubleshooting a Windows computer on which an application failed to properly uninstall. The technician made several changes to the registry and the system now crashes each time the system is rebooted. The only way to access the Operating System is via the Windows Recovery Environment command prompt. What critical step did the technician forget to perform before editing the registry? a. The technician should have rebooted before making changes to the registry. b. The technician did not configure MSConfig.exe. c. The technician did not launch the registry editor using Run as administrator. d. The technician should have backed up the registry.

d. The technician should have backed up the registry.

Your CIO would like a way to locate desktops if they are stolen. They do not want to purchase software but would like to be able to identify a computer that belongs to the company. Currently, the computers are marked with asset tags. What is a more permanent way to label computers? a. LoJack b. Hardware token c. Port locks d. Theft prevention plate

d. Theft prevention plate

Which of the following Shell commands are useful for gathering system information in a script? a. get-info b. return c. repeat d. echo

d. echo

In a PowerShell script, the comment lines are colored _____ and are meant to _____ what the command below the comment is doing. a. red; document b. red; show c. blue; step in to d. green; document

d. green; document


Set pelajaran terkait

Chapter 9 - Entrepreneurs and Business Organizations

View Set

Ch 6 Nursing care of patients with fluid, Electrolytes, and acid-base imbalances quiz questions from FA Davis

View Set